зеркало из https://github.com/mozilla/gecko-dev.git
Bug 1572240 - Part 4: Stop minting new URIs and principals in ContentBlockingAllowList._basePrincipalForAntiTrackingCommon; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D42205 --HG-- extra : moz-landing-system : lando
This commit is contained in:
Родитель
575c480fc5
Коммит
68aa0ff3f4
|
@ -43,29 +43,13 @@ const ContentBlockingAllowList = {
|
|||
}
|
||||
},
|
||||
|
||||
_baseURIForAntiTrackingCommon(browser) {
|
||||
// Convert document URI into the format used by
|
||||
// AntiTrackingCommon::IsOnContentBlockingAllowList.
|
||||
// Any scheme turned into https is correct.
|
||||
try {
|
||||
return Services.io.newURI("https://" + browser.currentURI.hostPort);
|
||||
} catch (e) {
|
||||
// Getting the hostPort for about: and file: URIs fails, but TP doesn't work with
|
||||
// these URIs anyway, so just return null here.
|
||||
return null;
|
||||
}
|
||||
},
|
||||
|
||||
_basePrincipalForAntiTrackingCommon(browser) {
|
||||
let baseURI = this._baseURIForAntiTrackingCommon(browser);
|
||||
if (!baseURI) {
|
||||
let principal = browser.contentBlockingAllowListPrincipal;
|
||||
// We can only use content principals for this purpose.
|
||||
if (!principal || !principal.isContentPrincipal) {
|
||||
return null;
|
||||
}
|
||||
let attrs = browser.contentPrincipal.originAttributes;
|
||||
return Services.scriptSecurityManager.createContentPrincipal(
|
||||
baseURI,
|
||||
attrs
|
||||
);
|
||||
return principal;
|
||||
},
|
||||
|
||||
_permissionTypeFor(browser) {
|
||||
|
|
Загрузка…
Ссылка в новой задаче